From 4e71ccc954f99f2eb1aee7a5722ee692c9e72abc Mon Sep 17 00:00:00 2001 From: Aaron Kaplan Date: Tue, 24 Dec 2013 12:20:31 +0100 Subject: [PATCH] typos typos typos --- src/practical_settings/ssh.tex | 2 +- src/practical_settings/webserver.tex | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/src/practical_settings/ssh.tex b/src/practical_settings/ssh.tex index 25bc3d0..bcb3f76 100644 --- a/src/practical_settings/ssh.tex +++ b/src/practical_settings/ssh.tex @@ -18,7 +18,7 @@ \end{lstlisting} % XXX: curve25519-sha256@libssh.org only available upstream(!) -Note: Older linux systems won't support SHA2. PuTTY (Windows) does not support +Note: Older Linux systems won't support SHA2. PuTTY (Windows) does not support RIPE-MD160. Curve25519, AES-GCM and UMAC are only available upstream (OpenSSH 6.1). DSA host keys have been removed on purpose, the DSS standard does not support for DSA keys stronger than 1024bit diff --git a/src/practical_settings/webserver.tex b/src/practical_settings/webserver.tex index bc9d161..2003288 100644 --- a/src/practical_settings/webserver.tex +++ b/src/practical_settings/webserver.tex @@ -263,7 +263,7 @@ tested using https://www.ssllabs.com. \label{tab:MS_IIS_Client_Support} \end{table} -Table~\ref{tab:MS_IIS_Client_Support} shows the algoriths from +Table~\ref{tab:MS_IIS_Client_Support} shows the algorithms from strongest to weakest and why they need to be added in this order. For example insisting on SHA-2 algorithms (only first two lines) would eliminate all versions of Firefox, so the last line is needed to -- 2.20.1